نتایج جستجو برای: vulnerability detection
تعداد نتایج: 606748 فیلتر نتایج به سال:
At Present, it is very essential to establish a high level network security to make sure the more trusted and secure communication between various organizations. Network Security provides a platform to secure information channels from the huge amount of network attacks. Intrusion Detection System (IDS) is an estimable tool for the defense mechanism in computer networks. IDS focus on detecting o...
In general, computer software vulnerabilities are de ned as special cases where an unexpected behavior of the system leads to the degradation of security properties or the violation of security policies. These vulnerabilities can be exploited by malicious users or systems impacting the security and/or operation of the attacked system. Since the literature on vulnerabilities is not always availa...
Vulnerability is a major threat to software security. It has been proven that binary code similarity detection approaches are efficient search for recurring vulnerabilities introduced by sharing in software. However, these suffer from high false-positive rates since they usually take the patched functions as vulnerable, and do not work well when binaries compiled with different compilation sett...
background: the safety of rehabilitation centers is of great importance to ensure the well-being of patients. the present study aimed to determine non-structural and functional vulnerability of state rehabilitation centers of tehran city welfare organization in disasters using national standard instruments in 2014. materials and methods: this study has a descriptive and cross-sectional design. ...
More and more information systems are now available over the Internet. As a result of rising complexity and network integration, the number of vulnerabilities is increasing. To meet the growing threat situation, a higher amount of security measures is required. For this issue, the question whether and how alternative approaches of vulnerability detection can be developed and optimized, especial...
Trauma-related psychopathology has been associated with an intense emotional reaction to stressful event. Emotional responses have evolved to signal the presence of risks to be avoided or of rewards to be approached in the environment. Thus, individuals' sensitivity to signals of risk and reward may affect the level of stress vulnerability. Stress, however, can modify these sensitivities as wel...
Vulnerability signatures offer better precision and flexibility than exploit signatures when detecting network attacks. We show that it is possible to detect vulnerability signatures in high-performance network intrusion detection systems, by developing a matching architecture that is specialized to the task of vulnerability signatures. Our architecture is based upon: i) the use of high-speed p...
The vulnerability scanner designed in this paper completed the collection of information and scanning vulnerability, including six parts: input assets, asset collection, profile, plug-in upload, single case detection report display. framework vue realized front end that included pages, gin back end. interface separation database using MySQL seven tables. This can avoid tedious repetitive work, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید